Categories Breaking News

Breaking News – Cyber Threats – 2025-12-11 02:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2025-12-11 02:00 PST

  • Google fixes eighth Chrome zero-day exploited in attacks in 2025
    BleepingComputer • 2025-12-11 00:01 • www.bleepingcomputer.com
    Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, marking the eighth such security flaw patched since the start of the year. […]
    https://www.bleepingcomputer.com/news/security/google-fixes-eighth-chrome-zero-day-exploited-in-attacks-in-2025/
  • It didn’t take long: CVE-2025-55182 is now under active exploitation
    Securelist • 2025-12-10 23:30 • securelist.com
    Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here’s what you need to know about the vulnerability, how our honeypots are being targeted, what malware is being deployed, and how to protect your systems.
    https://securelist.com/cve-2025-55182-exploitation/118331/
  • Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
    The Hacker News • 2025-12-10 23:09 • thehackernews.com
    Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild.
    The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID “466192044.” Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and
    https://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html
  • Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
    The Hacker News • 2025-12-10 21:56 • thehackernews.com
    Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.
    “Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution,” security researcher Bryan Masters said.
    https://thehackernews.com/2025/12/hard-coded-gladinet-keys-let-attackers.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like